Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "bc6d3cdd-b2b7-475f-b12b-724ce6b77f54"}, "_deposit": {"id": "4848", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4848"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4848", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Analysis of Security Assessment in Software Refactoring", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Refactoring is the process of restructuringexisting computer code – changing the factoring –without changing its external behavior. It is acommon approach to producing better qualitysoftware. However, its impact on the security ofprograms has received relatively little attention.Traditionally, security of software is not consideredfrom the very beginning of a software developmentlife cycle, and it is only incorporated in the laterstages of development as an afterthought. As aconsequence, there are increased risks of securityvulnerabilities that are introduced into softwarecoding after refactoring. The proposed systemanalyses two versions (before/after code refactoring)with two methods such as detect code flaw by Viega’s12 rules and detect vulnerabilities using Access LevelGraphs (ALGs).This approach to automatically codesecurity assessment and record documents bycomparing consecutive code versions. Usingdocumented code vulnerabilities facts, developerswill be decide this refactoring is whether codesecurity level is more or less."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "refactorings"}, {"interim": "vulnerabilities"}, {"interim": "software security"}, {"interim": "security refactoring"}, {"interim": "code flaw"}, {"interim": "Access Level Graph (ALG)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maw, Myint Myint"}, {"subitem_authors_fullname": "Oo, Khine Khine"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/746"}, "item_title": "Analysis of Security Assessment in Software Refactoring", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004848", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4848", "relation": {}, "relation_version_is_last": true, "title": ["Analysis of Security Assessment in Software Refactoring"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Analysis of Security Assessment in Software Refactoring

http://hdl.handle.net/20.500.12678/0000004848
http://hdl.handle.net/20.500.12678/0000004848
10534fcd-e35a-4ad5-b35b-c1a9be3eef27
bc6d3cdd-b2b7-475f-b12b-724ce6b77f54
Publication type
Article
Upload type
Publication
Title
Title Analysis of Security Assessment in Software Refactoring
Language en
Publication date 2017-02-16
Authors
Maw, Myint Myint
Oo, Khine Khine
Description
Refactoring is the process of restructuringexisting computer code – changing the factoring –without changing its external behavior. It is acommon approach to producing better qualitysoftware. However, its impact on the security ofprograms has received relatively little attention.Traditionally, security of software is not consideredfrom the very beginning of a software developmentlife cycle, and it is only incorporated in the laterstages of development as an afterthought. As aconsequence, there are increased risks of securityvulnerabilities that are introduced into softwarecoding after refactoring. The proposed systemanalyses two versions (before/after code refactoring)with two methods such as detect code flaw by Viega’s12 rules and detect vulnerabilities using Access LevelGraphs (ALGs).This approach to automatically codesecurity assessment and record documents bycomparing consecutive code versions. Usingdocumented code vulnerabilities facts, developerswill be decide this refactoring is whether codesecurity level is more or less.
Keywords
refactorings, vulnerabilities, software security, security refactoring, code flaw, Access Level Graph (ALG)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/746
Journal articles
Fifteenth International Conference on Computer Applications(ICCA 2017)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:24:12.893665
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL